Back to Trust Portal
Security
At Tekion, security isn't an afterthought-it's the foundation of everything we build. Your data, systems, and operations are protected from unauthorized access, threats, and disruption at every level. We’ve engineered security into every layer of our infrastructure, networks, and applications from day one.
Data Storage Site Security
Your data is stored in secured facilities with layered access controls, including:
Network Security
Your data travels across networks protected from unauthorized access‚-both internally and externally, by:
Platform Security
Every server, workstation, and cloud environment hosting your data is protected against both known and emerging threats, by:
Data Confidentiality
Your data stays confidential wherever it is stored, transmitted, or processed, through:
Data Access
Only authorized Tekion personnel can access your data through controlled and audited means, by:
Data Processing
Every time your data is processed by Tekion, these security practices apply:
Third-Party Security Procedures
Every third party that accesses your data is assessed and held to Tekion’s security standards, through:
Incident Management Procedure
Tekion’s incident management process is built to detect, contain, and recover from incidents in a timely manner, through:
Availability and continuity
Keeping your service online and recoverable is a top priority and the measures taken to ensure this include:
Security Built Upon a<xs> Strong Foundation
As an end-to-end AI-native, cloud platform, Tekion leverages the state-of-the-art security provided by Azure and AWS-so your data is protected by world-class security foundations.
Tekion has formal policies and procedures addressing how we develop, implement, maintain, and improve our robust information security program. We also have several internal policies governing how our employees and contractors access, store, and secure customer data. These policies follow a similar format, have dedicated owners, and committed review periods. The policies cover a variety of topics ranging from securing our employees’ assets to responding to security incidents.
Access to your data is generally limited to the following recipients: (1) our employees and contractors who require access to develop our products and services and to provide you with customer support (including employees of Tekion entities); (2) third-parties that you authorize us to share data with (e.g., third-party integrations that you use in your business); (3) third-party partners, including our <a href="https://go.tekion.com/subprocessors">sub-processors</a>, that we use to develop and support our products and services (e.g., our cloud service providers and OEMs). In some limited circumstances, we may also need to share your data with third-parties for legal purposes (e.g., in connection with a legal action or for tax purposes). However, in all instances, we share only the data that is necessary to fulfill the above purposes. For more information about how we use and share data, please see our <a href="/legal/privacy-policy">privacy policy</a>.<xs><xs>Additionally, our products have audit trails to give customers visibility over access to their data in Tekion’s systems, including their employees and third-party vendors. Please contact your solutions specialist for more information on obtaining this information.
Yes – please contact <a href="mailto:privacy@tekion.com">privacy@tekion.com</a> for more information.
Yes. Multi-factor authentication (MFA) is one of several tools that we use to secure data in our products and our internal systems. Authorized Tekion employees and contractors may only access Tekion systems and databases holding customer data through MFA. On the product side, MFA is enabled by default.
Yes, Tekion has a vulnerability management program. We also regularly conduct vulnerability assessment and penetration testing (VA/PT) as well. While we do not have a formal bug bounty program, we promptly investigate any reported security flaws and risks and address them as quickly as possible. To report a potential security risk, please contact <a href="mailto:security@tekion.com">security@tekion.com</a>.
Yes, Please <a href="/legal/tekion-service-level-agreement">click here</a> for the Service Level Availability Policy (SLA) and it has been posted on our website (Tekion Home page >> Legal >> Tekion® ARC Service Level Agreement)
In the event of a confirmed security incident affecting your data, Tekion will:
<xs><xs>
1. Notify you promptly via email to your designated contacts, within any timeframes required by applicable law
<xs><xs>
2. Provide incident details including what happened, what data was affected, potential harm, and remediation steps taken
<xs><xs>3. Support your notification obligations by providing information you need to notify your customers, if required
<xs><xs>
To ensure timely notification, please keep your contact information current in our system. For details, see our <a href="/legal/dpa">Data Processing Addendum</a>.